As we know that Firewall is a basic component for securing a network.The basic purpose of a firewall is to isolate one network from another. Firewalls are becoming available as appliances, meaning they are installed in to the network between two networks.The Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall so this article will explain on what methods do Hackers use to bypass/Hack firewalls

Firewall is often called Hindrance(Obstacle) in Hacking,the following chart will show you the working of the firewall.

The method which most Hackers use to bypass firewall is known as SSH tunneling.

What is SSH Tunneling?

Well according to wikipedia A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel

Most network administrators at work, university or school deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server. If you are constantly getting a message saying "Can't connect" or something similar, the service you are trying to connect to has probably been blocked by your network administrator.

SSHTunnelingDemonstration:

Now i will demonstrate you on How to Bypass/Hack firewall using SSH Tunneling

1.The first thing you need to do is to set up an account for SSH access,There are many paid and free SSH providers listed in DMOZdirectory,e.g Superprotocol.com